EU Nations Expand Their Cyber Defences

More European countries have been widening the scope of their cyber defence operations. Finland has rolled out significant legislative and intelligence facility funding proposals meant to strengthen national security and cyber-defence infrastructure.

One major initiative includes the establishment in Helsinki of the NATO-supported European Centre of Excellence for Countering Hybrid Threats, or ECE-CHT.

On the legislative side, Finland’s military and national security agencies will receive more expansive powers to conduct intelligence gathering inside and outside Finland’s borders.

The initiatives take place as Nordic national and military intelligence agencies issue fresh warnings regarding a potential escalation in cyber-attacks, mainly from Russian sources, that could target their critical government, defense and national security IT platforms.

Apart from Finland, the countries backing ECE-CHT include France, Germany, Latvia, Lithuania, Poland, Sweden and Britain. Other states are expected to join the ECE-CHT, which is due to be open in the second half of 2017.

The center will provide NATO with an additional counter-hybrid strategy resource. Other centers of excellence that already contribute to NATO’s efforts to counter hybrid threats are operating in Riga, Latvia, and Tallinn, Estonia.

The enhancement of surveillance powers for the military and national security agencies is fronted by legislative bills advanced by the ministries of Defence, Justice and the Interior. Finland’s national security agency, SUPO, will be able to gather and process technically based intelligence from cross-border network traffic for the first time.

The powers currently available to Finland’s military intelligence are being expanded to bolster the country’s defence capabilities. These will give the armed forces greater legal authority to conduct human, signals, information system and telecommunications intelligence operations, said Hanna Nordström, the ministerial working group’s chairperson.

“One objective of strengthened security operations would be to obtain information on relevant foreign military behavior and intelligence activities, and activities that pose a threat to public order, the development and distribution of military materials, and international crises,” Nordström said.

I-HLS: 

You Might Also Read:

Global C4ISR Has A Cyber Warfare Surge:

How A Cyber Attack Transformed Estonia:

Warning Over Russia's Cyber Warfare Methods:

 

« Police Innovative Reporting Technology
Cybersecurity Has A Serious Talent Shortage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

K7 Computing

K7 Computing

K7 provides antivirus and internet security products for business and home users.

Clusit

Clusit

Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security.

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

CANVAS Consortium

CANVAS Consortium

The CANVAS Consortium aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenges of cybersecurity.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

Post-Quantum

Post-Quantum

Post-Quantum offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks.

Dutch Accreditation Council (RvA)

Dutch Accreditation Council (RvA)

RvA is the national accreditation body for the Netherlands. The directory of members provides details of organisations offering certification services for ISO 27001.

Logic Supply

Logic Supply

Logic Supply is a global industrial PC company focused on hardware for the IoT edge. We design highly-configurable computers engineered for reliability.

BlackScore

BlackScore

BlackScore is a technology company seeking to disrupt risk assessment using AI-driven technology.

CloudBolt Software

CloudBolt Software

CloudBolt provide solutions for your toughest cloud challenges. From automation, to cost and security, and hybrid IT governance — we have you covered.

Kiteworks

Kiteworks

Kiteworks (formerly Accellion) creates a dedicated Private Content Network that ensures zero-trust private content protection and compliance.

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji) (formerly known as HLB Crosbie & Associates) is a well-established firm of accountants and business advisers in Fiji.

Network Contagion Research Institute (NCRI)

Network Contagion Research Institute (NCRI)

NCRI provides pioneering technology, research, and analysis to identify and forecast cyber-social threats targeting individuals, organizations, and communities.

FluidOne

FluidOne

FluidOne are an award-winning Connected Cloud Solutions provider. We design tailored solutions to help customers and partners digitally transform their IT and communications.

Lupasafe

Lupasafe

Lupasafe is a software for businesses to see IT risks and insights, and provide vital training for employees.